which of the following attacks?

Prev Question
Next Question

The use of residual biometric information to gain unauthorized access is an example of which of
the following attacks?

A.
Replay

B.
Brute force

C.
Cryptographic

D.
Mimic

Explanation:
Residual biometric characteristics, such as fingerprints left on a biometric capture device, may be
reused by an attacker to gain unauthorized access. A brute force attack involves feeding the
biometric capture device numerous different biometric samples. A cryptographic attack targets the
algorithm or the encrypted data, in a mimic attack, the attacker reproduces characteristics similar
to those of the enrolled user, such as forging a signature or imitating a voice.

Prev Question
Next Question

Leave a Reply

Your email address will not be published. Required fields are marked *